- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi,
Is it possible to configure exceptions for Zero Phishing?
This scenario exists where a customer doesn't want the Zero Phishing browser plugin to prompt for internal websites - i.e. ones behind their firewall on internal servers.
Yes, I get that this introduces the scenario where they could be redirected to an external site masquerading as an internal site but asking the question anyway...
TIA
Do you have the relevant domain configured here?
Hmmm, no, that didn’t suggest an exclusion.
So if a domain/IP address is entered in that box, the zero phishing browser plugin won’t scan it?
If so, rather than “Protected” should it not say “Excluded”?
Per the documentation for the Zero Phishing functionality:
Protected Domains - Add domains for which Password Reuse Protection is enforced.
SandBlast Agent keeps a cryptographic secure hash of the passwords used in these domains
and compares them to passwords entered outside of the protected domains
So, this dialog box is definitely about corporate password reuse, and is not about exclusions.
The SBA TE blade does have an exclusion configuration option... by default it is set to "Inspect all domains and files", but there is a dialog box to add exclusions there. I am not sure if these exclusions would be used by the browser extension / Zero Phishing feature though...
I did just have a Business Dev Director approach me and say that this was a problem for him as he was demoing websites for prospective customers and the "Scanning..." thing that Zero Phishing does on web forms "...did not look good...". <sigh>
Hopefully the exclusion setting will apply to the Zero Phishing feature, or I may need to add policy to disable this for a group of users / computers.
Has this been confirmed? Does adding the domain in this exclusions list apply to the Zero Phishing/Password Reuse feature?
Hi,
The answer is yes.
Suppose you want to exclude "gmail.com" and all its sub domains:
in the smart endpoint server, go to the policy tab, and edit the “Inspect all domains and files” option:
Add “.gmail.com” as excluded domain.
mail.checkpoint.co.uk
mail.checkpoint.co.il etc.
The most common use is to exclude a domain and its sub domains,
example : in order to excluded checkpoint.com and all its sub domains,
the user should insert: .checkpoint.com
Please note, 'Protected domains' defines the domains that will be protected by password reuse.
For more information please see our troubleshooting wiki page- https://wiki.checkpoint.com/confluence/pages/viewpage.action?spaceKey=PRODUCTINFO&title=SBA4B+Troubl...
Thanks,
Talya Ariel
Software Engineer
Hey Team,
Not to bump an old thread but can I confirm the exception will work properly for an IP as well?
I see an IP range option in the "protected domains" area, but not the "inspect all sites" exception area. Will a regex matching the range I want to exclude work here?
Hi,
Please see the answers to your questions in our SBA4B troubleshooting wiki page:
under the tab 'FAQ- Zero Phishing and General', question #4.
Thanks,
Talya Ariel
Software Engineer
As the public does not have access to our internal wiki, I'll copy/paste the instructions here.
A: Suppose you want to exclude "gmail.com" and all its sub domains:
in the smart endpoint server, go to the policy tab, and edit the “Inspect all domains and files” option:
Add “.gmail.com” as excluded domain.
mail.checkpoint.co.uk
mail.checkpoint.co.il etc.
The most common use is to exclude a domain and its sub domains,
example : in order to excluded checkpoint.com and all its sub domains,
the user should insert: .checkpoint.com
A: Exclusion rules for IPs are written in CIDR notation. You can follow the following examples:
|
rule
|
what will be excluded?
|
|---|---|
| 192.168.10.12/32 | exclude the IP 192.168.10.12 |
| 192.168.10.12/24 | exclude the class C network 192.168.10.* |
| 192.168.10.12/16 | exclude the class B network 192.168.* |
| 192.168.10.12/8 | exclude the class A network 192.* |
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Wed 19 Nov 2025 @ 11:00 AM (EST)
TechTalk: Improve Your Security Posture with Threat Prevention and Policy InsightsThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 19 Nov 2025 @ 11:00 AM (EST)
TechTalk: Improve Your Security Posture with Threat Prevention and Policy InsightsThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY